Previous Step   Previous Step Next Step   Next Step

Secure EJB 2.x applications.

Map Step 6 towards the goal: Implementing EJB 2.x applications

About this task

You can protect enterprise bean methods by assigning security roles to them. Before you assign security roles, you need to know which EJB methods need protecting and how to protect them.

Before you begin

Administer EJB 2.x applications.

Supporting information (generally applicable)

What to do next

Tune EJB 2.x applications.

Previous Step   Previous Step Next Step   Next Step


Terms and conditions for information centers | Feedback

Last updated: Feb 6, 2014 8:04:11 PM CST
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=matt&product=was-nd-mp&topic=tejb_implement_ejb2x_apps_step6
File name: tejb_implement_ejb2x_apps_step6.html